Mobile Deployment Process

To get started with Cybereason Mobile, you need to perform a number of steps, including deployment of the mobile infrastructure and the creation of security policies for your mobile protection.

To deploy Cybereason Mobile, follow these steps:

Step

Description

Deploy the Cybereason Mobile infrastructure

Cybereason Technical Operations and Technical Support deploy the necessary infrastructure as part of your Cybereason platform to enable you to use Cybereason Mobile.

Understand your device distribution and select a deployment mode

Understand the types of devices you have in your organization and your supervision needs.

Create activation profiles for device deployment

Activation profiles instruct Cybereason Mobile how to deploy sensors and the required deployment mode on each sensor.

Create one or more of these profiles to ensure all mobile devices deploy correctly with the required settings and connect with your Cybereason Mobile instance.

Set up integration with your UEM/MDM platform

To manage your device integration and deployment, you must use a UEM/MDM platform.

The integration configuration requires steps on both the UEM/MDM platform side and the Cybereason Mobile side.

Enable mobile threat alerts and remediation actions

Depending on your deployment mode, Cybereason Mobile detects different types of threats.

Select the threat level and automatic remediation action in your Cybereason platform.

Configure device and traffic settings

Select device settings and network exceptions for certain apps.

Install Mobile sensors

Deploy the Cybereason Mobile sensor (the Wandera app) to your devices.

Analyze collected data and detected behavior from mobile devices

Information from mobile devices integrates with existing information from all other sources in your Cybereason platform to give you a single view of all activity in your organization, from endpoint to mobile device.

Use the Cybereason platform’s abilities to help view mobile device activity.